Vulnerability Details : CVE-2023-23931
Potential exploit
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
Products affected by CVE-2023-23931
- cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23931
0.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23931
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
3.9
|
2.5
|
NIST | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L |
2.2
|
2.5
|
GitHub, Inc. | |
6.5
|
MEDIUM | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
N/A
|
N/A
|
Oracle:CPUOct2023 |
CWE ids for CVE-2023-23931
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-23931
-
https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3
Don't allow update_into to mutate immutable objects by alex · Pull Request #8230 · pyca/cryptography · GitHubPatch
-
https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf · Advisory · pyca/cryptography · GitHubExploit;Vendor Advisory
Jump to